WP Job Portal, PHP Remote File Inclusion, CVE-2025-47438 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-47438 is a PHP Local File Inclusion (LFI) vulnerability in WP Job Portal (versions up to 2.3.1). The flaw arises from improper sanitization of user-supplied input in file inclusion functions (include/require). Attackers can manipulate filename parameters to include arbitrary local or remote files, leading to remote code execution (RCE). By crafting malicious requests, an attacker can traverse directories, access sensitive files (e.g., /etc/passwd), or execute PHP code from external servers. This vulnerability is exploitable without authentication, making it critical.

DailyCVE Form

Platform: WordPress Plugin
Version: ≤ 2.3.1
Vulnerability: LFI → RCE
Severity: Critical
Date: 06/24/2025

Prediction: Patch by 07/15/2025

What Undercode Say

Check vulnerable versions
wp plugin list --name=wpjobportal --field=version
Exploit PoC (simulated)
curl -s "http://target/wp-content/plugins/wpjobportal/includes/file.php?path=../../../wp-config.php"
Mitigation command (until patch)
chmod -R 750 /wp-content/plugins/wpjobportal/

How Exploit

  1. Attacker sends crafted request with malicious file path.

2. Server processes untrusted input in `include()`/`require()`.

  1. Arbitrary PHP code execution via uploaded or remote files.

Protection from this CVE

1. Update to patched version post-release.

2. Disable plugin if unused.

3. Implement WAF rules blocking `../` sequences.

Impact

  • Remote code execution.
  • Sensitive data leakage.
  • Full site compromise.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top